NEWS > Cybersecurity News


« Back to News

2022-12-16

The Great Resignation

The Quiet Resignation: Five security awareness countermeasures to security threats derived from these workforce trends. By Omer Taran

2022-12-15

A New US National Cyber Strategy

Holistic: The US National Cyber Director has a new unified cyber strategy designed to dramatically transform America's cyber security position.

2022-12-14

Remote Work: Three Top Trends In 2023

IT Service Management: Three major trends that will impact remote work and the business practices around it in 2023. By Alexander Draaijer

2022-12-13

US Defense Contractors Don't Meet Basic Cyber Security Standards

Defenseless: Almost 90% of US defense contractors do not meet basic cyber security requirements that are considered vital to national security. 

2022-12-12

The Current Market For Cyber Security Founders & Investors

Strong IP, sustainable growth potential and a large defined addressable market will help start-ups to grow & prosper. By Damien Henault

2022-12-02

Cyber Security Predictions For 2023

Hackers will work together, specializing their skills to deliver ransomware to target sectors & victims, making insurance a priority. By Andy Harris

2022-11-29

Phishing- As-A-Service

'Robin Banks' Returns: A notorious phishing-as-a-service platform has relocated its infrastructure to a criminal platform located in Russia.

2022-11-23

How To Become A Cyber Millionaire

Cyber Security Professionals In Demand: Business and investment is booming and here are some career suggestions that could make you rich.

2022-11-18

The Hidden Costs Behind Black Friday Bargains

Hackers Ready To Pounce: Retailers can protect themselves against attacks during the sales surge of Black Friday & Christmas. By Bernard Montel

2022-11-16

The Internet Of "vulnerable" Things?

Being Smart And Being Secure Are Not Always The Same: How can we be both hyperconnected and secure? By Sarah Daun & Caroline Churchill 

2022-11-15

Guilty: A Criminal Conviction For One CISO Has Consequence For Others

Doing The Right Thing: Uber’s ex-security chief has been found guilty in a US court - what does that mean for CISOs in the UK? By Nigel Jones

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Cyber Tec Security

Cyber Tec Security

Cyber Tec Security is an IASME Certification Body for Cyber Essentials basic/Plus. We also provide ongoing Managed Security Services.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Lattica

Lattica

Lattica provides a cryptography solution for privacy-preserving interaction with AI services.

Cyber Security Centre for the Isle of Man (CSC)

Cyber Security Centre for the Isle of Man (CSC)

The Cyber Security Centre for the Isle of Man is responsible for the delivery of the Isle of Man National Cyber Security Strategy.

Breeze Security

Breeze Security

The Breeze Platform acts as a defense coordinator, unifying security across identities, endpoints, cloud, and data to expose real attack paths, orchestrate remediation, and detect threats.